This course is not currently offered by Global Knowledge. Information here is provided for reference only.

Part of Microsoft's Security Portfolio, this 5-day instructor-led course
provides the functional skills you need to plan and implement infrastructure
security and helps prepare you for the Implementing and Administering Security
in a Microsoft Windows Server 2003 Network exam (Exam 70-299). Though the
primary product focus is on Microsoft Windows Server 2003-based infrastructure
solutions, some client-focused content is included where appropriate.

Further, this course addresses the MCSA and MCSE skills path for IT
professional security practitioners, serving as the primary entry point for
those at the implementation level. Implementing and Administering Security in a Microsoft Windows Server 2003 Network.

Certification:

This course will help you prepare for this Microsoft Certified Professional
exam:

Who Needs to Attend

System administrators or system engineers who have the basic knowledge and skills to deploy secure Microsoft Windows Server 2003-based solutions. This course is not intended to provide design skills; however, it covers planning skills at a level sufficient to enable decision making for the implementation process.

Prerequisites

Experience with organizational resources such as web, FTP, and Exchange servers (detailed knowledge not expected)

Experience with shared resources and network services such as DHCP, DNS, and WINS is helpful

Follow-On Courses

There are no follow-ons for this course.

Course Outline

1. Planning and Configuring an Authentication and Authorization Strategy

Learn to evaluate the infrastructure of your organization and create and
document an authorization and authentication plan that allows the appropriate
level of access to various security principals. Examine trust relationships,
domain and forest functional levels, and basic security principles.

Components of an Authentication Model

Planning and Implementing an Authentication Strategy

Groups and Basic Group Strategy in Windows Server 2003

Creating Trusts in Windows Server 2003

Planning, Implementing, and Maintaining an Authorization Strategy
Using Groups

2. Installing, Configuring, and Managing Certification Authorities

Discover the fundamentals of the systems that make secure communication
possible. Learn methods, such as a public key infrastructure (PKI), that enable
you to securely communicate on networks.

Overview of a PKI

Introduction to Certification Authorities

Installing a Certification Authority

Managing a Certification Authority

Backing Up and Restoring a Certification Authority

3. Configuring, Deploying, and Managing Certificates

Ensure certificates are issued to the correct security principals and for the
intended purpose. Learn how to make the deployment of certificates an easy and
straightforward task for end users.

6. Planning, Configuring, and Deploying a Secure Member Server Baseline

The security of a network depends on the security configuration of the
servers that make up the network. Any breach of security on a single server can
jeopardize the security of all computers in the network, thereby jeopardizing
the security of the network itself. In this section, learn how to create secure
baselines for servers.

11. Planning and Implementing Security for Wireless Networks

A wireless network uses technology that enables two or more devices to
communicate through standard network protocols and electromagnetic waves - not
network cabling - to carry signals over part or all of the communication path.

Networks in organizations today are commonly interconnected - various
networks within an organization connect to each other, and corporate networks
connect to the Internet. Although this presents new business opportunities, it
can also cause concerns about security, performance, and manageability.

Introduction to Internet Security and Acceleration Server 2004

Installing and Managing ISA Server 2004

Securing a Perimeter Network by Using ISA Server 2004

Publishing Servers on a Perimeter Network

Planning a Perimeter Network

Implementing a Perimeter Network

Securing an ISA Server 2000 Computer

13. Securing Remote Access

Remote access enables outside, or remote access, clients to access corporate
networks as if they were directly connected to the corporate network. The remote
access clients connect to the network by using dial-up communication links. The
security of a network is compromised if unauthorized remote users gain access to
intranet-based resources. An effective network access security design ensures
confirmation of the identity of the clients attempting to access your
organization's network resources and protection of specific resources from
inappropriate access by users.